Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Qualcomm Releases Car Platform

June 23, 2016 by  
Filed under Computing

Comments Off on Qualcomm Releases Car Platform

Qualcomm has released its Connected Car Reference Platform so that the car industry to build prototypes for the next-generation connected car.

Qualcomm could make piles of dosh if car-makers choose its platforms in the future. While it looks like the whole program and hardware package is not there yet, it gives developers something to play with which should see it under the bonnet of the next generation of car automation.

The next trick will be to get autonomous steering and collision avoidance features into the package. Qualcomm will probably apply its machine learning SDK, announced just a few weeks ago, and the Snapdragon 820 processor.

In a press release Qualcomm said the Connected Car Reference Platform uses a common framework that scales from a basic telematics control unit (TCU) up to a highly integrated wireless gateway, connecting multiple electronic control units (ECUs) within the car and supporting critical functions, such as over-the-air software upgrades and data collection and analytics.

The vehicle’s connectivity hardware and software to be upgraded through its life cycle, providing automakers with a migration path from Dedicated Short Range Communications (DSRC) to hybrid/cellular V2X and from 4G LTE to 5G.

It can also manage concurrent operation of multiple wireless technologies using the same spectrum frequencies, such as Wi-Fi, Bluetooth and Bluetooth Low Energy.

The system supports OEM and third-party applications to providing a secure framework for the development and execution of custom applications.

Qualcomm appears to be working on the problem of over-the-air software updates. Updating software on a mission-critical system such as an autonomous car is a much harder problem than updating a smartphone because it has to be completely secure and work every time without reducing safety. However given that updates have stuffed up the mobile phone business and a car will need lots of them in its much longer working life, it is something which will need to be tackled.

Qualcomm has to solve this problem anyway to accelerate shipments not only to the car market but to the IoT market, where it hopes to sell tens of billions of chips.

Qualcomm says it expects to ship the Connected Car Reference Platform to automakers, tier 1 auto suppliers and developers late this year.

Courtesy-Fud

Cisco Fixes Major Flaw

March 23, 2016 by  
Filed under Computing

Comments Off on Cisco Fixes Major Flaw

Cisco has patched high-impact vulnerabilities in several of its cable modem and residential gateway devices which are popular among those distributed by ISPs to their customers.

The embedded Web server in the Cisco Cable Modem with Digital Voice models DPC2203 and EPC2203 contains a buffer overflow vulnerability that can be exploited remotely without authentication.  Apparently all you need to do is send a crafted HTTP requests to the Web server and you could see some arbitrary code execution.

Cisco said that its customers should contact their service providers to ensure that the software version installed on their devices includes the patch for this issue.

The Web-based administration interfaces of the Cisco DPC3941 Wireless Residential Gateway with Digital Voice and Cisco DPC3939B Wireless Residential Voice Gateway are affected by a vulnerability that could lead to information disclosure. An unauthenticated, remote attacker could exploit the flaw by sending a specially crafted HTTP request to an affected device in order to obtain sensitive information from it.

The Cisco Model DPQ3925 8×4 DOCSIS 3.0 Wireless Residential Gateway with EDVA is affected by a separate vulnerability, also triggered by malicious HTTP requests, that could lead to a denial-of-service attack.

Hackers have been hitting modems, routers and other gateway devices, hard lately – especially those distributed by ISPs to their customers. By compromising such devices, attackers can snoop on, hijack or disrupt network traffic or can attack other devices inside local networks.

Courtesy-Fud

Verizon Goes IoT

November 9, 2015 by  
Filed under Computing

Comments Off on Verizon Goes IoT

Verizon has rolled out ThingSpace, a development platform for companies of all sizes to create Internet of Things applications more efficiently and then later manage those apps.

The carrier also announced it is creating a new dedicated network core for IoT connections that can scale far beyond the ability of its existing networks with the intent to reach billions of sensors and devices.

“Continued innovation in smart cities, connected cars and wearables demonstrates that IoT is the future for how we will live and work,” said Mike Lanman, senior vice president of enterprise products at Verizon during an event held at Verizon’s San Francisco Innovation Center. He said Verizon is taking a “holistic approach” to help expand the IoT market from millions of connections to billions. The event was webcast.

Other major wireless carriers, including AT&T, are developing programs to offer a range of services to industries and cities for connecting IoT sensors to wireless networks and then to cloud services for data analysis.

At Verizon, Lanman said the company is working to lower the cost of connecting billions of existing devices that companies have used for years to Verizon’s network. Holding up a new computer chip made by Sequans Communications, an LTE chip maker, he said the chip will provide a “significant reduction in cost…that changes the game.” It will provide 4G LTE connectivity in modules connected to IoT devices to “make the wide-area network more accessible to developers.”

Also, next year Verizon will launch a new IoT core network within its LTE network to provide a “much lower cost” than with Verizon’s existing wired and wireless networks.

“The cost for an IoT module and the cost to connect will both drop dramatically,” Lanman added. “Whether you are connecting your dog or water meters and any other low-payload devices, we’ll handle it through a new IoT core.”

Source-http://www.thegurureview.net/consumer-category/verizon-launches-thingspace-for-iot-development.html

Is The Tesla Hackable?

September 9, 2013 by  
Filed under Security

Comments Off on Is The Tesla Hackable?

It’s the curse of the connected car once it’s linked to the Internet, it’s, well, on the Internet. In the case of the Tesla Model S, this means that mischievous hackers could, in theory, control some functions of the vehicle and even snoop without the owner’s knowledge.

Tesla offers Android and iPhone apps for Model S owners, which can be used to check the vehicle’s battery, track its location and status, and tweak several other settings, like climate control and the sunroof. It can also be used to unlock the doors on the Model S.

Dell senior engineer George Reese says the REST API used by Tesla to provide access for Android and iPhone apps has several fairly serious security flaws, which could offer a way in for unscrupulous hackers.

According to an article written by Reese for O’Reilly, Tesla appears to have broken from accepted best practice when designing the API for the Model S.

“It’s flawed in a way that makes no sense. Tesla ignored most conventions around API authentication and wrote their own. As much as I talk about the downsides to OAuth (a standard for authenticating consumers of REST APIs–Twitter uses it), this scenario is one that screams for its use,” he wrote.

However, Reese notes, this is merely a potential attack vector, not one that could be immediately exploited. That said, a compromised website particularly one designed to provide “value-added services” via the API to Tesla drivers could prove highly damaging.

“I can … honk their horns, flash their lights, and open and close the sunroof. While none of this is catastrophic, it can certainly be surprising and distracting while someone is driving,” Reese wrote.

Automotive hacking has been posited by experts for some time, and several presentations at this year’s Defcon detailed fairly comprehensive methods of compromising some models.

Source